Liveness Check
This documentation provides detailed information on how to integrate QoreID’s Liveness Detection service through both API and SDK.
Introduction
QoreID’s Liveness Detection verifies that the person behind the camera is physically present and not a spoof, deepfake, or replay attack. This safeguards identity verification workflows by ensuring that only real human users—not images, masks, or pre-recorded footage—can pass the authentication process.
Our solution is designed for seamless integration, high security, and a smooth user experience. Whether used during onboarding or re-authentication, Liveness Detection strengthens trust and protects against fraud in real time.
Integrating Liveness Detection SDK
By integrating QoreID’s Liveness SDK into your application, you can detect biometric spoofing attempts instantly. This enhances both the security and accuracy of your user verification workflows. The SDK is lightweight, intuitive, and supported across multiple platforms. Below is a table showing the government-issued IDs supported by Liveness Check
For more information on our Liveness Detection SDK (click
| S/N | Digital ID Supported by Facematch | Supported |
|---|---|---|
| 1 | NIN | ✅ |
| 2 | Virtual NIN | ✅ |
| 3 | Drivers License | ✅ |
| 4 | Nigerian Passport | ✅ |
| 5 | Voters Card | ❌ |
Key Features
- Real-time Verification
QoreID’s Liveness Detection performs instant, real-time evaluation of the user’s presence, enabling businesses to block fraudulent attempts the moment they occur. - Multiple Detection Modalities
Our solution uses several modalities—such as facial movement, eye blinking, and head rotation—to verify live human presence. This creates a high-confidence detection environment that is difficult for attackers to bypass. - Advanced Anti Spoofing Algorithms
Built on sophisticated machine-learning models, Liveness Detection can distinguish between real human motion and artificial attempts like printed photos, masks, deepfakes, or replayed videos. - Seamless Integration with Other Technologies
QoreID Liveness integrates effortlessly with face recognition, document verification, and other identity services to provide a unified, end-to-end identity verification solution. identity verification services - Accessibility
Our liveness technology can be accessed via both mobile and web SDKs, ensuring easy adoption across a wide range of applications and user environments. - Multi-Platform Support
QoreID Liveness works across various operating systems, mobile devices, and web applications, giving businesses maximum flexibility during implementation
Benefits
- Fraud Prevention
Liveness Detection helps prevent impersonation by confirming that the user is physically present and alive. This blocks attempts involving stolen photos, printed IDs, screens, or synthetic identities. - Increases Accuracy
By validating that a live human is behind the camera, the system delivers significantly more accurate identity verification results, reducing false positives and false negatives. - Enhances Security
Liveness acts as an additional protective layer in your identity verification stack, ensuring that no verification is approved without real-time proof of presence. - Improves User Experience
The process is fast, intuitive, and requires minimal user interaction. This reduces onboarding friction and eliminates the need for slow manual reviews. - Compliance with Regulations
Liveness Detection supports regulatory requirements for secure onboarding across industries such as finance, fintech, telecommunications, and mobility. It strengthens the integrity of your KYC and authentication flows.
Use Case for Liveness Detection
1️⃣ Identity Fraud Prevention
Liveness Detection is a critical tool for combating identity fraud. By confirming that the user is truly present during verification, businesses can prevent unauthorized access, protect customer accounts, and reduce financial losses.
QoreID’s re-authentication feature introduces an extra layer of protection by requiring users to confirm their identity again when performing sensitive actions—such as logging in on a new device or executing high-risk transactions.
This ensures that only the authorized user can access or modify their account, even if credentials are compromised.
Updated 17 days ago